Explore Cybersecurity Tips
Expert Advice from South College CIO Jeremy Underwood.
How Can You Protect Yourself from Cybersecurity Threats?
Cybersecurity 101: How to Protect Yourself from Scams, Identity Theft, and Online Threats
Why Cybersecurity Matters More Than Ever
If you have a:
- Phone
- Laptop
- Social media account
- Smart TV
You are a target.
Cybercrime is rising rapidly, and today’s attacks are more sophisticated than ever—powered by automation, data mining, and even AI.
In this episode of Live From South College, Chief Information Officer Jeremy Underwood breaks down how students (and anyone online) can protect themselves from growing digital threats.
What Is Cybersecurity—and Why Should You Care?
Cybersecurity isn’t just about protecting institutions.
It’s about protecting:
- Your identity
- Your finances
- Your future
Every time you:
- Shop online
- Apply for loans
- Submit assignments
- Log into apps
…you leave a digital footprint.
And if you’re not careful, that data can be stolen, misused, or exploited.
What Is Ransomware?
Ransomware is one of the fastest-growing cyber threats today.
Ransomware is when hackers lock your files or device and demand money to restore access.
Example:
- Your laptop is locked
- A message appears demanding payment
- Your files are inaccessible
How to Avoid Ransomware
- Don’t click suspicious links
- Never download unknown files
- Keep software updated
- Back up important data regularly
Most Common Cyber Threats Students Face
According to cybersecurity experts, students are frequent targets for:
Phishing Emails – Fake messages designed to steal login info
Fake Job Offers – Scams posing as recruiters or employers
Scholarship Scams – “Free money” traps that steal personal data
Social Media Hijacking – Fake login pages capturing credentials
Critical Rule
Never reuse passwords across accounts – If one account is compromised, all of them can be.
What Happens If You Click a Suspicious Link?
Clicking the wrong link can lead to:
- Stolen login credentials
- Access to your email or cloud storage
- Exposure of your contact list
- Full device control (camera, files, etc.)
The Scariest Scenario
Sometimes… nothing happens immediately.
That means:
Hackers may be silently collecting your data.
How to Protect Yourself from Identity Theft
Identity theft can damage your credit before your career even begins.
Here Are Best Practices:
Use Strong, Unique Passwords
(Pro tip: use long phrases or song lyrics)
Enable Multi-Factor Authentication (MFA)
Adds a second layer of protection
Limit Social Media Sharing
Hackers use personal info to guess security questions
Monitor Your Credit
Use free tools to detect breaches early.
Never Share Sensitive Info via Email/Text
How to Stay Safe at Home (Smart Devices Included)
Your home network is now a digital ecosystem. Risks Include:
- Smart TVs
- Voice assistants
- Connected appliances
- Public Wi-Fi usage
How to Protect Your Home
- Keep all devices updated
- Avoid public Wi-Fi when possible
- Use secure networks only
- Understand what each device can access
Real-Life Scam Example (And What to Learn)
A student’s parent receives a text:
“Mom, I’m in trouble. I need $500. Don’t tell dad.”
It uses:
- The correct name
- Urgency
- Emotional manipulation
This is how modern scams work.
Prevention & Lesson:
Always verify through a trusted method before responding. Ask your “child” a question in text only they would know the answer to.
The Role of AI in Cybercrime
Cyber threats are evolving rapidly due to AI.
Here Are The Emerging Risks
- AI-generated phishing emails
- Voice impersonation (deepfake audio)
- Hyper-personalized scams
The Reality
Cybercrime is not slowing down—it’s accelerating.
Which means full awareness is now essential.
Equally Important: How to Shop Safely Online
If you shop online (and who doesn’t), follow these rules:
1. Only Buy from Trusted Brands
If you don’t recognize the company:
- Check third-party review sites
- Avoid impulse purchases from ads
2. Verify Emails Before Clicking
Example:
- Email says “Costco” But click the email address to see who is “really is
- Actual sender = random Gmail address
Immediate red flag!
3. Don’t Click Text Message Links
Instead:
- It may look like “Amazon” in text or UPS. But, open the official app first
- Check notifications there
4. Use Protected Platforms
Safer options include:
- Aggregated marketplaces like eBay or amazon or Etsy
- Verified shopping apps like Shop app by Shopify
- Credit card-backed purchases like Capital One Shopping
5. Protect Your Personal Data
Before entering:
- Your Email
- Your Phone number
- Your Payment info
Ask Yourself: “Do I trust this company?”
Pro Tip
Create a “junk email” for:
- Promotions
- New accounts
- Shopping sites
Why Cybersecurity Careers Are Booming
Cybersecurity isn’t just a concern—it’s a career opportunity.
Demand for Cybersecurity Professionals Is Exploding
Every organization today is:
- Digital
- Data-driven
- Vulnerable
Career Outlook
Graduates in cybersecurity can expect:
- Strong job demand
- Competitive salaries
- Meaningful, mission-driven work
Quick Facts on Cybersecurity
Q: What is ransomware?
A: A cyberattack that locks your data and demands payment for access.
Q: What is the biggest cybersecurity mistake?
A: Reusing passwords across multiple accounts.
Q: What should you do if you get a suspicious email?
A: Do not click links—verify the sender first.
Q: How can you prevent identity theft?
A: Use strong passwords, enable MFA, and limit personal data sharing.
Q: Is cybersecurity a good career?
A: Yes—it’s one of the fastest-growing and most in-demand fields.
Final Takeaway
Cybersecurity is no longer optional. It’s part of everyday life.
And the best defense?
Awareness + smart habits + staying vigilant
Interested in professional opportunities within the Computer Science & Engineering field? Click here for more information.
Bachelor of Science in Cybersecurity
Earn your bachelor’s degree 100% online in an evolving and fascinating field. Start working toward tomorrow’s opportunities in cybersecurity today.
Online See Program